Introduction to Security & Privacy - Part 2 (Suan Dusit, July 9, 2015)

  • View
    132

  • Download
    0

Embed Size (px)

Transcript

  1. 1. 1 (Part 2) . 9 .. 2558 http://www.slideshare.net/nawanan
  2. 2. 2 Outline 1 () Security & Privacy? Security/Privacy Security 2 () Security/Privacy Social Media
  3. 3. 3 Security
  4. 4. 4 Confidentiality Integrity Availability Information Security
  5. 5. 5 . .. 2550 . .. 2544 . ( 2) .. 2551 (electronic signature) e- transactions
  6. 6. 6 ( 7) (1) (2) ( 9) . ( 25) . ( 35) .
  7. 7. 7 . .. 2549 .. 2553 Security Policy .. 2553 Privacy Policy .
  8. 8. 8 . .. 2553 .. 2555 Critical Infrastructure .
  9. 9. 9 25 . . .. 2553 3 (, , ) ( ) ( Critical Infrastructure)
  10. 10. 10
  11. 11. 11 ( Worst Case Scenario 1 ) : : 1-1,000 : > 1,000 1
  12. 12. 12 11 (Domains) Security policy Organization of information security Asset management Human resources security Physical and environmental security Communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business continuity management Regulatory compliance Security
  13. 13. 13 . .. 2550 (Computer- Related Crimes) ? (Computer Crimes) Hacking, , (Crimes Using Computers as Tools)
  14. 14. 14 1 5 (Unauthorized access) (hacking), hack 6 . .. 2550
  15. 15. 15 . .. 2550 7 (Unauthorized access) 8 9
  16. 16. 16 . .. 2550 10 Denial of Service (DoS) Attack = 11 spam e-mail 13 .
  17. 17. 17 . .. 2550 14 (1) (2) (3) (4) (5) (1)-(4)
  18. 18. 18 . .. 2550 15 14 16
  19. 19. 19 . .. 2550 2 18 (1) (2) (3) (4) (5) (6) (7) (8)
  20. 20. 20 . .. 2550 19-21 . 26 90 ... 90
  21. 21. 21 Privacy
  22. 22. 22 Privacy Autonomy (/) Beneficence () Non-maleficence () First, Do No Harm.
  23. 23. 23 Hippocratic Oath ... What I may see or hear in the course of treatment or even outside of the treatment in regard to the life of men, which on no account one must spread abroad, I will keep myself holding such things shameful to be spoken about. ... http://en.wikipedia.org/wiki/Hippocratic_Oath
  24. 24. 24 Privacy . .. 2550 7
  25. 25. 25 323 ...
  26. 26. 26 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 7.
  27. 27. 27http://www.prasong.com/// Social Media Case Study
  28. 28. 28 " OPD ... ... ... Happy -- . Follow-up " Social Media
  29. 29. 29 Privacy Security Informed Consent + (enforce) Privacy Security
  30. 30. 30 + Security http://c2.likes-media.com/img/c88376b3e79ac46a289879d2178e9b41.600x.jpg http://likes.com/comedy/best-facebook-fails-ever?fb_action_ids=854715637875685&fb_action_types=og.likes&page=10
  31. 31. 31 Facebook Privacy Settings
  32. 32. 32 Facebook Privacy Settings
  33. 33. 33 . .. 2550
  34. 34. 34 Privacy Security concepts